diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libssl/tls13_handshake.c | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_handshake.c b/src/lib/libssl/tls13_handshake.c index ed70ec1f4b..1528bd5e2a 100644 --- a/src/lib/libssl/tls13_handshake.c +++ b/src/lib/libssl/tls13_handshake.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_handshake.c,v 1.45 2020/01/25 06:37:30 beck Exp $ */ | 1 | /* $OpenBSD: tls13_handshake.c,v 1.46 2020/01/25 13:11:20 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018-2019 Theo Buehler <tb@openbsd.org> | 3 | * Copyright (c) 2018-2019 Theo Buehler <tb@openbsd.org> |
4 | * Copyright (c) 2019 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2019 Joel Sing <jsing@openbsd.org> |
@@ -363,6 +363,9 @@ tls13_handshake_send_action(struct tls13_ctx *ctx, | |||
363 | return TLS13_IO_FAILURE; | 363 | return TLS13_IO_FAILURE; |
364 | } | 364 | } |
365 | 365 | ||
366 | if (ctx->handshake_message_sent_cb != NULL) | ||
367 | ctx->handshake_message_sent_cb(ctx, &cbs); | ||
368 | |||
366 | tls13_handshake_msg_free(ctx->hs_msg); | 369 | tls13_handshake_msg_free(ctx->hs_msg); |
367 | ctx->hs_msg = NULL; | 370 | ctx->hs_msg = NULL; |
368 | 371 | ||
@@ -399,6 +402,9 @@ tls13_handshake_recv_action(struct tls13_ctx *ctx, | |||
399 | if (!tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs))) | 402 | if (!tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs))) |
400 | return TLS13_IO_FAILURE; | 403 | return TLS13_IO_FAILURE; |
401 | 404 | ||
405 | if (ctx->handshake_message_recv_cb != NULL) | ||
406 | ctx->handshake_message_recv_cb(ctx, &cbs); | ||
407 | |||
402 | /* | 408 | /* |
403 | * In TLSv1.3 there is no way to know if you're going to receive a | 409 | * In TLSv1.3 there is no way to know if you're going to receive a |
404 | * certificate request message or not, hence we have to special case it | 410 | * certificate request message or not, hence we have to special case it |